WO1996041488A1 - Fraud detection system for electronic networks using geographical location coordinates - Google Patents

Fraud detection system for electronic networks using geographical location coordinates Download PDF

Info

Publication number
WO1996041488A1
WO1996041488A1 PCT/US1996/010096 US9610096W WO9641488A1 WO 1996041488 A1 WO1996041488 A1 WO 1996041488A1 US 9610096 W US9610096 W US 9610096W WO 9641488 A1 WO9641488 A1 WO 9641488A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
transaction
billing authority
information
location
Prior art date
Application number
PCT/US1996/010096
Other languages
French (fr)
Inventor
Marc S. Cooperman
Original Assignee
The Dice Company
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by The Dice Company filed Critical The Dice Company
Publication of WO1996041488A1 publication Critical patent/WO1996041488A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/47Fraud detection or prevention means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/24Accounting or billing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2215/00Metering arrangements; Time controlling arrangements; Time indicating arrangements
    • H04M2215/01Details of billing arrangements
    • H04M2215/0148Fraud detection or prevention means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2215/00Metering arrangements; Time controlling arrangements; Time indicating arrangements
    • H04M2215/20Technology dependant metering
    • H04M2215/2026Wireless network, e.g. GSM, PCS, TACS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2215/00Metering arrangements; Time controlling arrangements; Time indicating arrangements
    • H04M2215/32Involving wireless systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/61Time-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent

Definitions

  • a code which is attributed to each user serves as the billing identification.
  • the subscriber must input the code manually to validate each purchase.
  • These codes may be credit card numbers, allowing the service provider to directly debit the accounts of these subscribers.
  • passwords may be used. Note that credit card numbers and passwords may also be added to electronic networks like cellular phone network to provide alternate billing options.
  • the credit card company may use this information to spot a misappropriated card number, if the card is used in locations deemed unusual based on the previous charges compiled by the legitimate card holder.
  • Such information is not necessarily available or reliable on computer systems.
  • Computer networks pose particular problems to the usefulness of such information, since an individual may typically connect to and operate computers from anywhere in the world, with minimal effort. Tracking an individual on a computer network to an actual geographical location can be quite difficult, especially if they do not want to be located.
  • Even telecommunications networks which may offer "trace" capabilities, like the phone system, can be fooled by individuals with the technical know- how to disguise their signal.
  • Stilp discloses a system and method for establishing the location of a cellular handset unit, using triangulation data from 3 or more ground-located cell site antennae, using information from the Global Positioning System (GPS) .
  • GPS Global Positioning System
  • the triangulation data is transmitted from the cell site, to a central site, and finally to a database, which may be co-located with the central site.
  • Stilp details an algorithm for collating the data from said 3 or more cell sites, determining handset location from such data, and storing this information in the database.
  • the patent basically provides a method by which an existing cellular telephone network may be adapted to perform GPS location calculations.
  • Stilp et al. relies on the existing cellular phone system infrastructure to make use of cell-site broadcast/receive antennae, in order to calculate a global position
  • a system which can extend its use beyond cellular phones.
  • One possibility is by the inclusion in the terminal hardware of GPS receiving circuits to tap into the Global Positioning Satellites in position around the planet in order to address the problem of fraud.
  • the prior art relies on the periodic distribution of a list of good and bad cellular IDs, maintained manually by a billing authority, which is possibly incomplete, to individual cell sites which handle requests for service.
  • the system described herein may also check such a list but it also compares global coordinates associated with each request against an accumulated list of past transaction information from the same ID. The present system then determines based on the timing of shifts in location coordinates for a given device whether such a request is from a device that has likely been cloned. So, whereas the prior art aims to stop the granting of service to stolen IDs, the system disclosed herein aims to go a step further and actually identify stolen IDs, using the collation of location data from multiple transactions. Summary of the Invention
  • the present invention is directed towards improving the detection of fraud on such electronic systems by causing to be associated with a registration record additional information comprised of a time stamp indicating the time the transaction occurred, and location coordinates generated by the terminal device and integrated into the transaction protocol.
  • the present invention is also intended to be used in more general purpose computing devices incorporated into networks (such as LAN and WAN) for the purposes of adding an additional layer of security to more traditional computer to computer transaction security protocols.
  • Such computing devices could be retrofitted with hardware to provide the location information.
  • One possibility is to provide GPS data.
  • the present invention is meant to incorporate location data at a very low level of the protocol to add reliable geographical positioning information to computer networks.
  • hardware is added to a computing or other electronic device.
  • Typical devices are those used to incur liability or conduct transactions for purpose of information exchange, or request of service, such as a cellular phone handset or a computer terminal.
  • the hardware can receive signals from the various Global Position System satellites in orbit about the Earth. The signals allow the hardware to determine to a high degree of accuracy (9 meters or less) the exact position on the surface of the planet which the device occupies.
  • the hardware which is deployed in tamperproof packaging within the device, directly relays the GPS information to the computing system itself, for transmission to a billing authority.
  • location receiving hardware in the computing access device can add a new dimension of geographical location, which is not inherent in transactions between computer systems, to the transaction information.
  • location is used together with timing information, and the assumption that each device ID code is unique (i.e., there can be only 1 authorized device which generates a specific code)
  • multiple transactions attributed to the same device ID are collated by the billing authority
  • transactions in which authorization was impossible or highly improbable are immediately apparent to the billing authority. For instance, two transactions could not occur simultaneously in two disparate locations for the same device ID.
  • a transaction conducted at 9 am EST in New York City is suspicious when viewed in the context of the same device incurring a transaction at 3:1 am Pacific time on the same day.
  • the invention herein disclosed improves the state of the art by taking an "active" approach to fraud detection.
  • This new system automatically determines on a transaction by transaction basis whether each transaction is suspicious. This leads to faster detection of fraud, and thus fewer instances of fraud and decreased monetary losses that result from it.
  • the methods described as part of the new invention apply beyond the realm of cellular phone service to any remotely delivered electronic service which depends on a piece of terminal hardware.
  • the present invention represents an improvement over the prior art, in providing a method and apparatus for the active detection of fraud on remote, distributed electronic systems.
  • Figure 1 shows a schematic of an example embodiment of the present invention
  • a fraud detection and prevention system for remote, electronic delivery of goods or services includes a multitude of subscriber terminal devices 1, which contain telecommunication links with local authorization sites 3 over various bi ⁇ directional wired 8 or wireless 9 telecommunications paths.
  • Each terminal device contains a unique serial identification number (SIN) , which is embedded in an integrated circuit within the device, as well as circuitry which receives and correlates signals from three or more Global Positioning Satellites 2 and furthermore generates global positioning system coordinates, identifying the terminal location.
  • SIN serial identification number
  • a terminal device requests a transaction, it transmits the transactional data along with SIN and GPS coordinates to the authorization site along the wired 8 or wireless 0 telecom path.
  • Authorization sites 3 are connected via high bandwidth telecommunications paths 7 to a distributed database cloud 15 having one or more database servers 5 which work in tandem to service requests from various authorization sites and which updates database records between like servers 5.
  • Authorization sites 3 are also connected to a central database archive 6, which continuously updates its records from the distributed servers, and which redistributes its information regarding recent transactions en masse to each distributed server at certain periodic intervals of low network utilization. Only one database server 5 is required to answer a request from a given authorization site 3 for a given transaction.
  • Each distributed database server 5 may maintain records of up to N most recent transactions for each SIN, while the central archive contains all records for a SIN, which may be greater than N.
  • each distributed server 5 can maintain a master list of valid SINs, periodically received from the central archive. The master list also contains a last known GPS position for each SIN.
  • the authorization site 3 communicates the SIN and GPS information for a given transaction to a database server 5 in a validation request along a telecommunications path 7. All database servers 5, including the central archive, index their records by SIN. These servers 5 maintain transaction records including information such as SIN, transactional information such as type and price of product or service.
  • the GPS coordinates from which the transaction was conducted, and a timestamp reflecting the server 5 received the validation request.
  • the database servers 5 are preferably kept within 10 seconds of time synchronization.
  • the server 5 verifies the SIN and retrieves the most recent transactional record which matches the SIN. If the SIN is not valid, the authorization may be rejected immediately, and a record of the request can be stored. The server 5 communicates the rejection to the authorization site via telecom path 7. If the SIN is valid, the server 5 can then compute the distance the terminal has traveled, if any, since the previous transaction. It can also compute the number of seconds which have elapsed since the last transaction. These two numbers can be used to calculate an implied groundspeed for the terminal.
  • Threshold limits may then be established on terminal inter-transaction groundspeed which trigger an immediate warning to billing authorities and/or an automatic rejection of the transaction. Levels of distinction could also be programmed.
  • the database server could give a warning if a fast, but possible speed was implied (if a terminal were in flight on a jet, for instance) , and could give a rejection if an impossible speed was implied (if two transactions requests were registered from the same SIN simultaneously from New York and San Francisco, signaling a clear SIN cloning attempt) .
  • a SIN could also be invalidated across all database servers upon a rejection.
  • SIN and GPS receiver circuitry are preferably installed in tamperproof IC packages, and strong encryption would be used on all transmissions in the transaction validation protocol.
  • Example The example concerns simultaneous transactions originating in New York and San Francisco, and is depicted in Figure 1.
  • John Q. uses his terminal without disturbance for a few months, mostly in San Francisco and the surrounding area. Then John Q. travels to New York City to visit a friend for a week, taking his terminal with him. While in New York, he uses the terminal several times, in wireless mode, to check his e-mail. Unknown to John, an individual in New York has stolen his SIN from the air and cloned John's terminal. A few days after his return to San Francisco, the thief begins using the cloned device.
  • John wakes up one morning at 9 am and decides to check his e-mail over a dialup service in San Francisco.
  • John leaves a transaction record including his SIN, GPS coordinates and time (normalized to Greenwich Mean Time) in the central database, and is soon disseminated throughout the distributed database cloud.
  • the New York-based thief calls a distant foreign country and talks to friends and family for a few hours, all to be charged to John's account. He uses his cloned terminal lb, which also contains SIN #5555555.
  • the validation process looks up the last transaction on SIN #5555555, finding John's e- mail retrieval from San Francisco half an hour earlier, and yields an implied ground speed of about 6,000 miles per hour (3,000 miles / .5 hours), well above the impossibility threshold set up by the billing authority.
  • the request is denied, John Q. Public's SIN is marked as invalid, and John is quickly notified he needs to register for a new SIN, before any money has been lost.
  • a subscriber might use an active option on their terminal to continuously transmit GPS data to an authorization site in an effort to catch a thief in the act. Given the processing speed of current servers and the high communications speeds possible between computer systems, a delay of only a few seconds to check SINs against a database is achievable.

Abstract

An active fraud detection and fraud prevention system for electronic networks which gathers and collates location information for each of a number of uniquely identified terminal devices (1) on the network. The system analyzes the location information in real time, on a transaction by transaction basis, to determine the likelihood that a terminal device (1) has been cloned or illegally duplicated. The system then automatically rejects transactions for devices (1) it considers likely to be cloned, alerts human operators, and keeps records of suspicious transaction attempts.

Description

Fraud Detection System for Electronic Networks Using Geographical Location Coordinates
Background of the Invention In recent years a number of electronic communications networks, computer networks, and on-line systems have proliferated. These systems all deliver some value in goods or services to the subscriber, who pays fees for both the usage of the system and the value of goods or services purchased. These systems include some method of billing the subscriber, the intent of which is to attribute to that subscriber the charges associated with his/her authorized use of the system, and thus generate a liability on the part of the subscriber. In the case of electronic networks like cellular phone systems, which are delivered to the subscriber in small portable devices, an identification code is integrated into the subscriber's device, in order to identify that subscriber, who is typically remote from the billing authority. In the case of computer networks and on-line services, a code which is attributed to each user serves as the billing identification. In this case, the subscriber must input the code manually to validate each purchase. These codes may be credit card numbers, allowing the service provider to directly debit the accounts of these subscribers. In other cases, passwords may be used. Note that credit card numbers and passwords may also be added to electronic networks like cellular phone network to provide alternate billing options.
These systems all share a common problem. Possession of the ID code (or device, which implies possession of the ID code) of a subscriber allows an unauthorized individual to charge goods and services to the account of that subscriber, thus perpetrating acts of fraud on the system. A stolen cellular phone, a cloned phone, or a stolen credit card number or other password will allow such fraud, typically until discrepancies are noticed upon the next account statement. In some extreme cases, sudden inordinate charges, or charges incurred from widely disparate geographical points of sale (using credit cards) may alert the billing authority to a problem more expediently. Note that there is inherent geographical information included in the address/location of the commercial entity who generates a charge on a credit card. The credit card company may use this information to spot a misappropriated card number, if the card is used in locations deemed unusual based on the previous charges compiled by the legitimate card holder. Such information is not necessarily available or reliable on computer systems. Computer networks in particular, and possibly electronic and telecommunication networks, like that of cellular phones, do not include or associate any geographical data on the point of sale with such transactions in the billing database. Computer networks pose particular problems to the usefulness of such information, since an individual may typically connect to and operate computers from anywhere in the world, with minimal effort. Tracking an individual on a computer network to an actual geographical location can be quite difficult, especially if they do not want to be located. Even telecommunications networks which may offer "trace" capabilities, like the phone system, can be fooled by individuals with the technical know- how to disguise their signal.
US Patent 5,327,144, issued to Stilp, et al. , discloses a "Cellular Telephone Location System" . Stilp discloses a system and method for establishing the location of a cellular handset unit, using triangulation data from 3 or more ground-located cell site antennae, using information from the Global Positioning System (GPS) . The triangulation data is transmitted from the cell site, to a central site, and finally to a database, which may be co-located with the central site. Finally, Stilp details an algorithm for collating the data from said 3 or more cell sites, determining handset location from such data, and storing this information in the database. The patent basically provides a method by which an existing cellular telephone network may be adapted to perform GPS location calculations.
Previous systems for prevention of fraud in electronic services focused on methods for tracking the fraudulent device after the billing authority has determined that fraud is likely or is definitely being committed. Such methods are termed herein as "passive" fraud detection systems. Such a system is detailed, e.g., in US Patent 5,335,278, "Fraud Prevention System and Process for Cellular Mobile Telephone Systems", to Matchett, et al. Matchett describes a system whereby the central cell sites, as described in Stilp, et al . , can gain access to a list, describing user authorization data, maintained by many or all cellular service providers. An improvement detailed in Matchett et al. is the ability of each cell site to check an incoming request for service against this list in real¬ time, to determine, before service is granted, whether the request is from a legitimate user. If the ID codes in the user' s handset were either a) not on the list or b) listed as stolen, the request for service is denied, and the billing authority could presumably use the methods of Stilp et al. to gather location data. Matchett et al. also describes a method of distributing this authorization data to remote cell sites via a satellite downlink.
While Stilp et al. relies on the existing cellular phone system infrastructure to make use of cell-site broadcast/receive antennae, in order to calculate a global position, there is a need for a system which can extend its use beyond cellular phones. One possibility is by the inclusion in the terminal hardware of GPS receiving circuits to tap into the Global Positioning Satellites in position around the planet in order to address the problem of fraud. The prior art relies on the periodic distribution of a list of good and bad cellular IDs, maintained manually by a billing authority, which is possibly incomplete, to individual cell sites which handle requests for service. There is a need for a system which details links between approval sites to update and share information collected automatically in the course of processing transactions in a central database. While the prior art relies on a simple comparison of serial numbers versus valid and stolen numbers to identify requests from known stolen Ids or fictitious IDs, the system described herein may also check such a list but it also compares global coordinates associated with each request against an accumulated list of past transaction information from the same ID. The present system then determines based on the timing of shifts in location coordinates for a given device whether such a request is from a device that has likely been cloned. So, whereas the prior art aims to stop the granting of service to stolen IDs, the system disclosed herein aims to go a step further and actually identify stolen IDs, using the collation of location data from multiple transactions. Summary of the Invention
The present invention is directed towards improving the detection of fraud on such electronic systems by causing to be associated with a registration record additional information comprised of a time stamp indicating the time the transaction occurred, and location coordinates generated by the terminal device and integrated into the transaction protocol. The present invention is also intended to be used in more general purpose computing devices incorporated into networks (such as LAN and WAN) for the purposes of adding an additional layer of security to more traditional computer to computer transaction security protocols. Such computing devices could be retrofitted with hardware to provide the location information. One possibility is to provide GPS data. Speci ically, the present invention is meant to incorporate location data at a very low level of the protocol to add reliable geographical positioning information to computer networks.
In a first embodiment of the present invention, hardware is added to a computing or other electronic device. Typical devices are those used to incur liability or conduct transactions for purpose of information exchange, or request of service, such as a cellular phone handset or a computer terminal. The hardware can receive signals from the various Global Position System satellites in orbit about the Earth. The signals allow the hardware to determine to a high degree of accuracy (9 meters or less) the exact position on the surface of the planet which the device occupies. The hardware, which is deployed in tamperproof packaging within the device, directly relays the GPS information to the computing system itself, for transmission to a billing authority.
The inclusion of location receiving hardware in the computing access device can add a new dimension of geographical location, which is not inherent in transactions between computer systems, to the transaction information. When location is used together with timing information, and the assumption that each device ID code is unique (i.e., there can be only 1 authorized device which generates a specific code) , and multiple transactions attributed to the same device ID are collated by the billing authority, transactions in which authorization was impossible or highly improbable are immediately apparent to the billing authority. For instance, two transactions could not occur simultaneously in two disparate locations for the same device ID. Similarly, a transaction conducted at 9 am EST in New York City is suspicious when viewed in the context of the same device incurring a transaction at 6:30 am Pacific time on the same day. In such cases the validity of the registered device number involved in such transactions could be immediately suspended, pending further investigation, thus preventing additional fraud. If it is clear a device ID has been cloned, the device ID could be permanently retired, and the legitimate owner issued a new device with a fresh ID.
The invention herein disclosed improves the state of the art by taking an "active" approach to fraud detection. This new system automatically determines on a transaction by transaction basis whether each transaction is suspicious. This leads to faster detection of fraud, and thus fewer instances of fraud and decreased monetary losses that result from it. In addition, the methods described as part of the new invention apply beyond the realm of cellular phone service to any remotely delivered electronic service which depends on a piece of terminal hardware. The present invention represents an improvement over the prior art, in providing a method and apparatus for the active detection of fraud on remote, distributed electronic systems.
Brief Description of the Figures Figure 1 shows a schematic of an example embodiment of the present invention:
Detailed Description
For the purposes of this discussion please refer to the accompanying Figure 1.
While the embodiment described herein primarily concerns GPS data, it should be noted that any location determining system may be utilized. A fraud detection and prevention system for remote, electronic delivery of goods or services includes a multitude of subscriber terminal devices 1, which contain telecommunication links with local authorization sites 3 over various bi¬ directional wired 8 or wireless 9 telecommunications paths. Each terminal device contains a unique serial identification number (SIN) , which is embedded in an integrated circuit within the device, as well as circuitry which receives and correlates signals from three or more Global Positioning Satellites 2 and furthermore generates global positioning system coordinates, identifying the terminal location. When a terminal device requests a transaction, it transmits the transactional data along with SIN and GPS coordinates to the authorization site along the wired 8 or wireless 0 telecom path. Authorization sites 3 are connected via high bandwidth telecommunications paths 7 to a distributed database cloud 15 having one or more database servers 5 which work in tandem to service requests from various authorization sites and which updates database records between like servers 5. Authorization sites 3 are also connected to a central database archive 6, which continuously updates its records from the distributed servers, and which redistributes its information regarding recent transactions en masse to each distributed server at certain periodic intervals of low network utilization. Only one database server 5 is required to answer a request from a given authorization site 3 for a given transaction.
Each distributed database server 5 may maintain records of up to N most recent transactions for each SIN, while the central archive contains all records for a SIN, which may be greater than N. In addition, each distributed server 5 can maintain a master list of valid SINs, periodically received from the central archive. The master list also contains a last known GPS position for each SIN. The authorization site 3 communicates the SIN and GPS information for a given transaction to a database server 5 in a validation request along a telecommunications path 7. All database servers 5, including the central archive, index their records by SIN. These servers 5 maintain transaction records including information such as SIN, transactional information such as type and price of product or service. The GPS coordinates from which the transaction was conducted, and a timestamp reflecting the server 5 received the validation request. The database servers 5 are preferably kept within 10 seconds of time synchronization. When a database server 5 receives a validation request, the server 5 verifies the SIN and retrieves the most recent transactional record which matches the SIN. If the SIN is not valid, the authorization may be rejected immediately, and a record of the request can be stored. The server 5 communicates the rejection to the authorization site via telecom path 7. If the SIN is valid, the server 5 can then compute the distance the terminal has traveled, if any, since the previous transaction. It can also compute the number of seconds which have elapsed since the last transaction. These two numbers can be used to calculate an implied groundspeed for the terminal. Threshold limits may then be established on terminal inter-transaction groundspeed which trigger an immediate warning to billing authorities and/or an automatic rejection of the transaction. Levels of distinction could also be programmed. The database server could give a warning if a fast, but possible speed was implied (if a terminal were in flight on a jet, for instance) , and could give a rejection if an impossible speed was implied (if two transactions requests were registered from the same SIN simultaneously from New York and San Francisco, signaling a clear SIN cloning attempt) . A SIN could also be invalidated across all database servers upon a rejection.
In a practical implementation of the system, SIN and GPS receiver circuitry are preferably installed in tamperproof IC packages, and strong encryption would be used on all transmissions in the transaction validation protocol.
Even in the case where encryption is not used, or it is broken, the cloned device must still be made to transmit false GPS coordinates which correspond to within a close proximity (as small as 9 meters) of the legitimate device, each time it is used. Otherwise, there is still the means of detection if the cloned device transmits false coordinates different from the legitimate device in close temporal association. Example The example concerns simultaneous transactions originating in New York and San Francisco, and is depicted in Figure 1. A subscriber who lives in San Francisco owns a terminal la. He is registered with the billing authority under the name John Q. Public, with his San Francisco address and phone number. A unique SIN, #5555555, was issued to him and is associated with his registration, reflecting the number hardwired into the tamperproof assembly inside his terminal device. John Q. uses his terminal without disturbance for a few months, mostly in San Francisco and the surrounding area. Then John Q. travels to New York City to visit a friend for a week, taking his terminal with him. While in New York, he uses the terminal several times, in wireless mode, to check his e-mail. Unknown to John, an individual in New York has stolen his SIN from the air and cloned John's terminal. A few days after his return to San Francisco, the thief begins using the cloned device. John wakes up one morning at 9 am and decides to check his e-mail over a dialup service in San Francisco. In connecting to his mail service, John leaves a transaction record including his SIN, GPS coordinates and time (normalized to Greenwich Mean Time) in the central database, and is soon disseminated throughout the distributed database cloud. At 12:30 pm EST, the New York-based thief calls a distant foreign country and talks to friends and family for a few hours, all to be charged to John's account. He uses his cloned terminal lb, which also contains SIN #5555555. When the initial request for service is processed, the validation process looks up the last transaction on SIN #5555555, finding John's e- mail retrieval from San Francisco half an hour earlier, and yields an implied ground speed of about 6,000 miles per hour (3,000 miles / .5 hours), well above the impossibility threshold set up by the billing authority. The request is denied, John Q. Public's SIN is marked as invalid, and John is quickly notified he needs to register for a new SIN, before any money has been lost.
The example above makes certain simplifications for clarity, such as a cloned device in New York and the original in San Francisco, the obvious nature of the fraudulent use, and the immediate disabling of the SIN. In practice, GPS can provide a detailed resolution of cloning within a single metropolitan area, since coordinates are accurate to within 9 meters of a terminal's actual position. Another consideration is that in practice it may take several fraudulent transactions until a suitable coincidence of subscriber and thief, each trying to use the system, flags the problem. Regardless of this limitation, the system still provides a facility for detecting such fraud automatically, before a complete billing cycle has expired, reducing total losses. In addition, if fraud is suspected, a subscriber might use an active option on their terminal to continuously transmit GPS data to an authorization site in an effort to catch a thief in the act. Given the processing speed of current servers and the high communications speeds possible between computer systems, a delay of only a few seconds to check SINs against a database is achievable.

Claims

What Is Claimed Is:
1. A network system for delivering information with fraud detection and fraud prevention, comprising: a plurality of electronic terminal devices; a protocol for communicating over at least one telecommunications link which interconnects said devices on the network; a coordinate locator locating each of said plurality of terminals; at least one billing authority node connected to the network, said node communicating with said plurality of terminal devices, and said node maintaining records of terminal usage and terminal owner liability due to such usage, such that said plurality of terminal devices communicate with said at least one billing authority node using said protocol, such that said plurality of terminal devices, via said protocol, obtain approval of delivery of the information via said network to said terminal devices from said at least one billing authority and incur liability with said at least billing authority for the terminal owner, wherein the liability is recorded in at least one database connected to said at least one billing authority.
2. A method for the detection and prevention of fraud in an electronic network system, utilizing terminal location information, comprising the step of: (a) associating in a database linked to a billing authority via a billing authority node, for at least one transaction, information identifying a transaction record.
3. The method of claim 2, wherein said transaction record is complete and includes: i. a terminal device ID; ii. a terminal owner; iii. location information locating the terminal at a time corresponding to the start of the transaction; iv. the time at which the billing authority started processing the transaction; v. a description of the information or service involved in the transaction; vi. the time at which the billing authority finished processing the transaction; vii. the location coordinates at the end of the transaction; viii. the cost of the transaction.
4. The method of claim 2, wherein said transaction record is partial and includes: i. a terminal device ID; ii. a terminal owner; iii. location information at a time corresponding to the start of the transaction; iv. the time at which the billing authority started processing the transaction; v. a description of the information or service involved in the transaction.
5. The method of claim 3, further comprising the step of receiving from said plurality of terminal devices using said protocol: i. terminal device ID; ii. location information; iii. a description of the information or service involved in the transaction; iv. the location information at the end of the transaction.
6. The method of claim 3, further comprising the step of providing from the billing authority elements corresponding to: i. a terminal owner; ii. the time at which said at least one billing authority started processing the transaction; iii. the time at which said at least one billing authority finished processing the transaction.
7. The method of claim 2, further comprising the step of determining said terminal owner from said terminal device ID by looking up an ownership record which associates a terminal owner with a terminal device ID, the status of said terminal device id, and the last reported location of the terminal device.
8. The method of claim 2, further comprising the step of determining the time at which said at least one billing authority started processing the transaction and the time at which said at least one billing authority finished processing the transaction from the local time.
9. The method of claim 3, further comprising the steps of: a. determining items i-iv at the start of a new transaction, using said terminal device ID to search ownership records in said database to determine the validity of terminal device ID, wherein if said terminal device ID is not valid, alerting said billing authority and storing a record containing information items i-v in a list of denied transactions.
10. The method of claim 2, further comprising the step of using item i to search transaction records in said database for the most recent previously existing transaction record which matches the terminal device ID.
11. The method of claim 2, further comprising the step of finding matching transaction records, comparing the time and location of the previous record with the time and location of the new record, and imputing an implied ground-speed for the terminal device, between current and previous transaction.
12. The method of claim 11, further comprising the step of comparing the implied ground speed with a threshold limit set by the billing authority, approving the transaction if the implied ground speed is at or below the threshold, and denying the transaction authorization if the ground speed is above the threshold.
13. The method of claim 4, further comprising the step of alerting the billing authority, storing a record of information items i-iv in a list of denied transactions.
14. A network system with fraud detection and fraud prevention, comprising: a plurality of electronic terminal devices; means to deliver information to the terminal user via the network; means to incur liability to the registered terminal owner in exchange for the provision of the information; a protocol for communicating over at least one telecommunications link which interconnects said plurality of devices on the network; at least one billing authority node connected to said network, communicating with said plurality of terminal devices, said node maintaining records of terminal usage and terminal owner liability due to such usage, such that said plurality of terminal devices communicate with said at least one billing authority node via telecommunications links which connect the terminals with billing authority nodes; wherein said billing authority analyzes the telecommunications link to said terminal to provide coordinates describing the location of said terminal device; such that said plurality of terminal devices use said protocol to obtain approval of delivery of information via said network to said plurality of terminal devices from said at least one billing authority and incur liability with said at least one billing authority for the terminal owner, wherein the liability is recorded in at least one database connected to said at least one billing authority.
15. A network system with fraud detection and fraud prevention, comprising: a plurality of electronic terminal devices; means to deliver information to the terminal user via the network, means to incur liability to a registered terminal owner in exchange for the provision of the goods or services; a protocol for communicating over at least one telecommunications link connecting the devices on the network; a coordinate locator locating said terminal; at least one billing authority node connected to said network, said at least one node communicating with said plurality of terminal devices, said node maintaining records of terminal usage and terminal owner liability; such that said plurality of terminal devices communicate with said at least one billing authority node via telecommunications links which connect the terminals with billing authority nodes; wherein said at least one billing authority analyzes the telecommunications link to one of said plurality of terminal devices to provide coordinates describing the location of said one of said terminal devices; and such that said plurality of terminal devices use said protocol to obtain approval of delivery of information via said network to said plurality of terminal devices from said at least one billing authority.
16. The method of claim 2, further comprising the step of combining a threshold ground speed limit with a predetermined region of valid coordinates, and pre- programmed into the database, such that said region is associated with the ownership record for the device ID of the owner and said region is used to screen validation, such that the billing authority rejects any transactions outside the region regardless of groundspeed, and allows any transactions within the region which do not exceed the groundspeed threshold.
17. The method of claim 2, further comprising the step of incorporating a user controlled "active" locating option into a terminal device such that it continuously broadcasts its location to a billing authority in an attempt to increase the probability of detection of fraudulent transactions by a cloned device, such that as each transmission is received, the location is noted in the SIN master list as the last location coordinates.
18. The method of claim 2, wherein said terminal device ID is supplemented by ID codes other than the device ID to isolate occurrences of fraud using misappropriated account numbers from non-cloned computing devices.
19. The method of claims 2, further comprising the step of using encryption techniques to encode the transmission of sensitive ID codes, location information, and time stamp data from one of said plurality of terminal devices to said billing authority.
20. The method of claim 9, further comprising the step of invalidating the terminal identification number.
PCT/US1996/010096 1995-06-07 1996-06-07 Fraud detection system for electronic networks using geographical location coordinates WO1996041488A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US48102195A 1995-06-07 1995-06-07
US08/481,021 1995-06-07

Publications (1)

Publication Number Publication Date
WO1996041488A1 true WO1996041488A1 (en) 1996-12-19

Family

ID=23910262

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1996/010096 WO1996041488A1 (en) 1995-06-07 1996-06-07 Fraud detection system for electronic networks using geographical location coordinates

Country Status (1)

Country Link
WO (1) WO1996041488A1 (en)

Cited By (46)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999003287A1 (en) * 1997-07-11 1999-01-21 Northern Telecom Limited An authentication and tracking system for a cellular telephone
DE19845199A1 (en) * 1998-10-01 2000-04-06 Maz Mikroelektronik Anwendungs Time stamping data with official time e.g. for electronic signature on digital documents by using decrypted official time signal to set internal time source
WO2001045444A1 (en) * 1999-12-13 2001-06-21 Nokia Corporation Detecting a fraudulent mobile station in a mobile communication system using location information of mobile station
EP1186123A1 (en) * 2000-03-09 2002-03-13 Peace and Mission support center Hybrid method and system of the improved bidirectional gps and cellular/pcs
EP1207505A1 (en) * 2000-11-15 2002-05-22 TELEFONAKTIEBOLAGET LM ERICSSON (publ) Method for payment, user equipment, server, payment system and computer programme product
EP1235189A1 (en) * 2001-02-26 2002-08-28 Keyware Technologies A biometric sensing device
WO2003036576A2 (en) * 2001-10-20 2003-05-01 Wojciech Wojciechowski Method and system of additional securing of payment card payments
WO2002017124A3 (en) * 2000-08-25 2003-05-22 Reveo Inc Internet-based method of and system for authorizing electronic payment using time-space stamping
GB2384398A (en) * 2001-11-28 2003-07-23 Nec Corp Mobile communication device capable of notifying user when deviating from a predetermined area
GB2428938A (en) * 2005-08-05 2007-02-07 Motorola Inc Unauthorized call activity in a cellular communication network
CN1925437B (en) * 2005-08-29 2010-10-06 国际商业机器公司 System and method for detecting status changes in a network
US8285639B2 (en) 2005-07-05 2012-10-09 mConfirm, Ltd. Location based authentication system
US8374634B2 (en) 2007-03-16 2013-02-12 Finsphere Corporation System and method for automated analysis comparing a wireless device location with another geographic location
US8831564B2 (en) 2007-03-16 2014-09-09 Finsphere Corporation System and method for identity protection using mobile device signaling network derived location pattern recognition
WO2015103216A1 (en) * 2014-01-02 2015-07-09 Visa International Service Association Location obfuscation for authentication
US9185123B2 (en) 2008-02-12 2015-11-10 Finsphere Corporation System and method for mobile identity protection for online user authentication
US9420448B2 (en) 2007-03-16 2016-08-16 Visa International Service Association System and method for automated analysis comparing a wireless device location with another geographic location
US9432845B2 (en) 2007-03-16 2016-08-30 Visa International Service Association System and method for automated analysis comparing a wireless device location with another geographic location
US9572036B2 (en) 2014-11-20 2017-02-14 At&T Intellectual Property I, L.P. Detection and blocking of cloned mobile devices
US9922323B2 (en) 2007-03-16 2018-03-20 Visa International Service Association System and method for automated analysis comparing a wireless device location with another geographic location
US9948629B2 (en) 2009-03-25 2018-04-17 The 41St Parameter, Inc. Systems and methods of sharing information through a tag-based consortium
US9990631B2 (en) 2012-11-14 2018-06-05 The 41St Parameter, Inc. Systems and methods of global identification
US10021099B2 (en) 2012-03-22 2018-07-10 The 41st Paramter, Inc. Methods and systems for persistent cross-application mobile device identification
US10091312B1 (en) 2014-10-14 2018-10-02 The 41St Parameter, Inc. Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
US10089679B2 (en) 2006-03-31 2018-10-02 The 41St Parameter, Inc. Systems and methods for detection of session tampering and fraud prevention
US10339527B1 (en) 2014-10-31 2019-07-02 Experian Information Solutions, Inc. System and architecture for electronic fraud detection
US10417637B2 (en) 2012-08-02 2019-09-17 The 41St Parameter, Inc. Systems and methods for accessing records via derivative locators
US10453066B2 (en) 2003-07-01 2019-10-22 The 41St Parameter, Inc. Keystroke analysis
US10593004B2 (en) 2011-02-18 2020-03-17 Csidentity Corporation System and methods for identifying compromised personally identifiable information on the internet
US10592982B2 (en) 2013-03-14 2020-03-17 Csidentity Corporation System and method for identifying related credit inquiries
US10699028B1 (en) 2017-09-28 2020-06-30 Csidentity Corporation Identity security architecture systems and methods
US10726151B2 (en) 2005-12-16 2020-07-28 The 41St Parameter, Inc. Methods and apparatus for securely displaying digital images
CN112199573A (en) * 2020-08-05 2021-01-08 宝付网络科技(上海)有限公司 Active detection method and system for illegal transaction
US10896472B1 (en) 2017-11-14 2021-01-19 Csidentity Corporation Security and identity verification system and architecture
US10902327B1 (en) 2013-08-30 2021-01-26 The 41St Parameter, Inc. System and method for device identification and uniqueness
US10909617B2 (en) 2010-03-24 2021-02-02 Consumerinfo.Com, Inc. Indirect monitoring and reporting of a user's credit data
US10999298B2 (en) 2004-03-02 2021-05-04 The 41St Parameter, Inc. Method and system for identifying users and detecting fraud by use of the internet
US11010468B1 (en) 2012-03-01 2021-05-18 The 41St Parameter, Inc. Methods and systems for fraud containment
US11030562B1 (en) 2011-10-31 2021-06-08 Consumerinfo.Com, Inc. Pre-data breach monitoring
US11151468B1 (en) 2015-07-02 2021-10-19 Experian Information Solutions, Inc. Behavior analysis using distributed representations of event data
US11301585B2 (en) 2005-12-16 2022-04-12 The 41St Parameter, Inc. Methods and apparatus for securely displaying digital images
US11314838B2 (en) 2011-11-15 2022-04-26 Tapad, Inc. System and method for analyzing user device information
US11556932B2 (en) 2007-05-29 2023-01-17 Spriv Llc System for user authentication
US11792314B2 (en) 2010-03-28 2023-10-17 Spriv Llc Methods for acquiring an internet user's consent to be located and for authenticating the location information
US11818287B2 (en) 2017-10-19 2023-11-14 Spriv Llc Method and system for monitoring and validating electronic transactions
US11936803B2 (en) 2023-09-09 2024-03-19 Spriv Llc Authenticating the location of an internet user

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5235633A (en) * 1991-12-26 1993-08-10 Everett Dennison Cellular telephone system that uses position of a mobile unit to make call management decisions
US5335278A (en) * 1991-12-31 1994-08-02 Wireless Security, Inc. Fraud prevention system and process for cellular mobile telephone networks
US5335265A (en) * 1991-11-08 1994-08-02 Electronic Data Systems Corporation Apparatus for detecting and preventing subscriber number cloning in a cellular mobile telephone system
US5345595A (en) * 1992-11-12 1994-09-06 Coral Systems, Inc. Apparatus and method for detecting fraudulent telecommunication activity
US5365451A (en) * 1991-12-09 1994-11-15 Motorola, Inc. Mobile unit tracking system
US5535431A (en) * 1994-04-05 1996-07-09 Grube; Gary W. Method of detecting unauthorized use of a communication unit

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5335265A (en) * 1991-11-08 1994-08-02 Electronic Data Systems Corporation Apparatus for detecting and preventing subscriber number cloning in a cellular mobile telephone system
US5365451A (en) * 1991-12-09 1994-11-15 Motorola, Inc. Mobile unit tracking system
US5235633A (en) * 1991-12-26 1993-08-10 Everett Dennison Cellular telephone system that uses position of a mobile unit to make call management decisions
US5335278A (en) * 1991-12-31 1994-08-02 Wireless Security, Inc. Fraud prevention system and process for cellular mobile telephone networks
US5345595A (en) * 1992-11-12 1994-09-06 Coral Systems, Inc. Apparatus and method for detecting fraudulent telecommunication activity
US5535431A (en) * 1994-04-05 1996-07-09 Grube; Gary W. Method of detecting unauthorized use of a communication unit

Cited By (91)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6097938A (en) * 1997-07-11 2000-08-01 Northern Telecom Limited Authentication and tracking system for a cellular telephone
WO1999003287A1 (en) * 1997-07-11 1999-01-21 Northern Telecom Limited An authentication and tracking system for a cellular telephone
DE19845199A1 (en) * 1998-10-01 2000-04-06 Maz Mikroelektronik Anwendungs Time stamping data with official time e.g. for electronic signature on digital documents by using decrypted official time signal to set internal time source
US8442487B2 (en) 1999-12-13 2013-05-14 Nokia Corporation Detecting a fraudulent mobile station in a mobile communication system using location information of mobile station
WO2001045444A1 (en) * 1999-12-13 2001-06-21 Nokia Corporation Detecting a fraudulent mobile station in a mobile communication system using location information of mobile station
EP1186123A4 (en) * 2000-03-09 2004-11-03 Peace And Mission Support Ct Hybrid method and system of the improved bidirectional gps and cellular/pcs
EP1186123A1 (en) * 2000-03-09 2002-03-13 Peace and Mission support center Hybrid method and system of the improved bidirectional gps and cellular/pcs
WO2002017124A3 (en) * 2000-08-25 2003-05-22 Reveo Inc Internet-based method of and system for authorizing electronic payment using time-space stamping
WO2002041266A2 (en) * 2000-11-15 2002-05-23 Telefonaktiebolaget Lm Ericsson (Publ) Method for payment, user equipment, server, payment system and computer programme product
WO2002041266A3 (en) * 2000-11-15 2002-08-15 Ericsson Telefon Ab L M Method for payment, user equipment, server, payment system and computer programme product
EP1207505A1 (en) * 2000-11-15 2002-05-22 TELEFONAKTIEBOLAGET LM ERICSSON (publ) Method for payment, user equipment, server, payment system and computer programme product
EP1235189A1 (en) * 2001-02-26 2002-08-28 Keyware Technologies A biometric sensing device
WO2003036576A3 (en) * 2001-10-20 2003-11-27 Wojciech Wojciechowski Method and system of additional securing of payment card payments
WO2003036576A2 (en) * 2001-10-20 2003-05-01 Wojciech Wojciechowski Method and system of additional securing of payment card payments
US7376423B2 (en) 2001-11-28 2008-05-20 Nec Corporation Mobile communication device capable of notifying user when deviating from a predetermined area
GB2384398A (en) * 2001-11-28 2003-07-23 Nec Corp Mobile communication device capable of notifying user when deviating from a predetermined area
GB2384398B (en) * 2001-11-28 2004-02-11 Nec Corp Mobile communication device capable of notifying user when deviating from a predetermined area
US11238456B2 (en) 2003-07-01 2022-02-01 The 41St Parameter, Inc. Keystroke analysis
US10453066B2 (en) 2003-07-01 2019-10-22 The 41St Parameter, Inc. Keystroke analysis
US10999298B2 (en) 2004-03-02 2021-05-04 The 41St Parameter, Inc. Method and system for identifying users and detecting fraud by use of the internet
US11683326B2 (en) 2004-03-02 2023-06-20 The 41St Parameter, Inc. Method and system for identifying users and detecting fraud by use of the internet
US8285639B2 (en) 2005-07-05 2012-10-09 mConfirm, Ltd. Location based authentication system
GB2428938B (en) * 2005-08-05 2007-12-05 Motorola Inc Unauthorized call activity detection in a cellular communication system
GB2428938A (en) * 2005-08-05 2007-02-07 Motorola Inc Unauthorized call activity in a cellular communication network
CN1925437B (en) * 2005-08-29 2010-10-06 国际商业机器公司 System and method for detecting status changes in a network
US11301585B2 (en) 2005-12-16 2022-04-12 The 41St Parameter, Inc. Methods and apparatus for securely displaying digital images
US10726151B2 (en) 2005-12-16 2020-07-28 The 41St Parameter, Inc. Methods and apparatus for securely displaying digital images
US11195225B2 (en) 2006-03-31 2021-12-07 The 41St Parameter, Inc. Systems and methods for detection of session tampering and fraud prevention
US11727471B2 (en) 2006-03-31 2023-08-15 The 41St Parameter, Inc. Systems and methods for detection of session tampering and fraud prevention
US10535093B2 (en) 2006-03-31 2020-01-14 The 41St Parameter, Inc. Systems and methods for detection of session tampering and fraud prevention
US10089679B2 (en) 2006-03-31 2018-10-02 The 41St Parameter, Inc. Systems and methods for detection of session tampering and fraud prevention
US8831564B2 (en) 2007-03-16 2014-09-09 Finsphere Corporation System and method for identity protection using mobile device signaling network derived location pattern recognition
US9922323B2 (en) 2007-03-16 2018-03-20 Visa International Service Association System and method for automated analysis comparing a wireless device location with another geographic location
US10669130B2 (en) 2007-03-16 2020-06-02 Visa International Service Association System and method for automated analysis comparing a wireless device location with another geographic location
US9432845B2 (en) 2007-03-16 2016-08-30 Visa International Service Association System and method for automated analysis comparing a wireless device location with another geographic location
US9838872B2 (en) 2007-03-16 2017-12-05 Visa International Service Association System and method for mobile identity protection for online user authentication
US9848298B2 (en) 2007-03-16 2017-12-19 Visa International Service Association System and method for automated analysis comparing a wireless device location with another geographic location
US8374634B2 (en) 2007-03-16 2013-02-12 Finsphere Corporation System and method for automated analysis comparing a wireless device location with another geographic location
US9420448B2 (en) 2007-03-16 2016-08-16 Visa International Service Association System and method for automated analysis comparing a wireless device location with another geographic location
US11405781B2 (en) 2007-03-16 2022-08-02 Visa International Service Association System and method for mobile identity protection for online user authentication
US10354253B2 (en) 2007-03-16 2019-07-16 Visa International Service Association System and method for identity protection using mobile device signaling network derived location pattern recognition
US10776784B2 (en) 2007-03-16 2020-09-15 Visa International Service Association System and method for automated analysis comparing a wireless device location with another geographic location
US10776791B2 (en) 2007-03-16 2020-09-15 Visa International Service Association System and method for identity protection using mobile device signaling network derived location pattern recognition
US11556932B2 (en) 2007-05-29 2023-01-17 Spriv Llc System for user authentication
US9185123B2 (en) 2008-02-12 2015-11-10 Finsphere Corporation System and method for mobile identity protection for online user authentication
US11750584B2 (en) 2009-03-25 2023-09-05 The 41St Parameter, Inc. Systems and methods of sharing information through a tag-based consortium
US9948629B2 (en) 2009-03-25 2018-04-17 The 41St Parameter, Inc. Systems and methods of sharing information through a tag-based consortium
US10616201B2 (en) 2009-03-25 2020-04-07 The 41St Parameter, Inc. Systems and methods of sharing information through a tag-based consortium
US10909617B2 (en) 2010-03-24 2021-02-02 Consumerinfo.Com, Inc. Indirect monitoring and reporting of a user's credit data
US11792314B2 (en) 2010-03-28 2023-10-17 Spriv Llc Methods for acquiring an internet user's consent to be located and for authenticating the location information
US10593004B2 (en) 2011-02-18 2020-03-17 Csidentity Corporation System and methods for identifying compromised personally identifiable information on the internet
US11568348B1 (en) 2011-10-31 2023-01-31 Consumerinfo.Com, Inc. Pre-data breach monitoring
US11030562B1 (en) 2011-10-31 2021-06-08 Consumerinfo.Com, Inc. Pre-data breach monitoring
US11314838B2 (en) 2011-11-15 2022-04-26 Tapad, Inc. System and method for analyzing user device information
US11010468B1 (en) 2012-03-01 2021-05-18 The 41St Parameter, Inc. Methods and systems for fraud containment
US11886575B1 (en) 2012-03-01 2024-01-30 The 41St Parameter, Inc. Methods and systems for fraud containment
US11683306B2 (en) 2012-03-22 2023-06-20 The 41St Parameter, Inc. Methods and systems for persistent cross-application mobile device identification
US10862889B2 (en) 2012-03-22 2020-12-08 The 41St Parameter, Inc. Methods and systems for persistent cross application mobile device identification
US10341344B2 (en) 2012-03-22 2019-07-02 The 41St Parameter, Inc. Methods and systems for persistent cross-application mobile device identification
US10021099B2 (en) 2012-03-22 2018-07-10 The 41st Paramter, Inc. Methods and systems for persistent cross-application mobile device identification
US10417637B2 (en) 2012-08-02 2019-09-17 The 41St Parameter, Inc. Systems and methods for accessing records via derivative locators
US11301860B2 (en) 2012-08-02 2022-04-12 The 41St Parameter, Inc. Systems and methods for accessing records via derivative locators
US11410179B2 (en) 2012-11-14 2022-08-09 The 41St Parameter, Inc. Systems and methods of global identification
US10853813B2 (en) 2012-11-14 2020-12-01 The 41St Parameter, Inc. Systems and methods of global identification
US11922423B2 (en) 2012-11-14 2024-03-05 The 41St Parameter, Inc. Systems and methods of global identification
US9990631B2 (en) 2012-11-14 2018-06-05 The 41St Parameter, Inc. Systems and methods of global identification
US10395252B2 (en) 2012-11-14 2019-08-27 The 41St Parameter, Inc. Systems and methods of global identification
US10592982B2 (en) 2013-03-14 2020-03-17 Csidentity Corporation System and method for identifying related credit inquiries
US10902327B1 (en) 2013-08-30 2021-01-26 The 41St Parameter, Inc. System and method for device identification and uniqueness
US11657299B1 (en) 2013-08-30 2023-05-23 The 41St Parameter, Inc. System and method for device identification and uniqueness
WO2015103216A1 (en) * 2014-01-02 2015-07-09 Visa International Service Association Location obfuscation for authentication
US10091312B1 (en) 2014-10-14 2018-10-02 The 41St Parameter, Inc. Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
US11895204B1 (en) 2014-10-14 2024-02-06 The 41St Parameter, Inc. Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
US10728350B1 (en) 2014-10-14 2020-07-28 The 41St Parameter, Inc. Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
US11240326B1 (en) 2014-10-14 2022-02-01 The 41St Parameter, Inc. Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
US10339527B1 (en) 2014-10-31 2019-07-02 Experian Information Solutions, Inc. System and architecture for electronic fraud detection
US10990979B1 (en) 2014-10-31 2021-04-27 Experian Information Solutions, Inc. System and architecture for electronic fraud detection
US11436606B1 (en) 2014-10-31 2022-09-06 Experian Information Solutions, Inc. System and architecture for electronic fraud detection
US9572036B2 (en) 2014-11-20 2017-02-14 At&T Intellectual Property I, L.P. Detection and blocking of cloned mobile devices
US10200870B2 (en) 2014-11-20 2019-02-05 At&T Mobility Ii Llc Detection and blocking of cloned mobile devices
US9942770B2 (en) 2014-11-20 2018-04-10 At&T Intellectual Property I, L.P. Detection and blocking of cloned mobile devices
US10484873B2 (en) 2014-11-20 2019-11-19 At&T Intellectual Property I, L.P. Detection and blocking of cloned mobile devices
US11151468B1 (en) 2015-07-02 2021-10-19 Experian Information Solutions, Inc. Behavior analysis using distributed representations of event data
US11157650B1 (en) 2017-09-28 2021-10-26 Csidentity Corporation Identity security architecture systems and methods
US11580259B1 (en) 2017-09-28 2023-02-14 Csidentity Corporation Identity security architecture systems and methods
US10699028B1 (en) 2017-09-28 2020-06-30 Csidentity Corporation Identity security architecture systems and methods
US11818287B2 (en) 2017-10-19 2023-11-14 Spriv Llc Method and system for monitoring and validating electronic transactions
US10896472B1 (en) 2017-11-14 2021-01-19 Csidentity Corporation Security and identity verification system and architecture
CN112199573B (en) * 2020-08-05 2023-12-08 宝付网络科技(上海)有限公司 Illegal transaction active detection method and system
CN112199573A (en) * 2020-08-05 2021-01-08 宝付网络科技(上海)有限公司 Active detection method and system for illegal transaction
US11936803B2 (en) 2023-09-09 2024-03-19 Spriv Llc Authenticating the location of an internet user

Similar Documents

Publication Publication Date Title
WO1996041488A1 (en) Fraud detection system for electronic networks using geographical location coordinates
US10645072B2 (en) Method and system for validating transactions
US10776791B2 (en) System and method for identity protection using mobile device signaling network derived location pattern recognition
US7832636B2 (en) Method and system for authenticating use of item
US9727867B2 (en) Method for detecting misuse of identity in electronic transactions
US10521786B2 (en) Method of reducing fraud in on-line transactions
US20120052881A1 (en) Method and system for monitoring electronic purchases and cash-withdrawals
US8770477B2 (en) Method for identifying the georgrapic location of a router
US11308477B2 (en) Method of reducing fraud in on-line transactions
US8116731B2 (en) System and method for mobile identity protection of a user of multiple computer applications, networks or devices
CA2516690C (en) Method and module for blocking respectively unblocking of money accounts
CN1653472B (en) Method for guaranteeing safe financial transactions when using wireless network
WO2004079499A2 (en) System and method for verifying user identity
US20150142623A1 (en) System and method for identity protection using mobile device signaling network derived location pattern recognition
US20140137199A1 (en) Method and system for authenticating internet users
US20090045251A1 (en) Restricting bank card access based upon use authorization data
US20090204524A1 (en) Security system
KR100497223B1 (en) Method and System for Providing Location-Based Credit Card Authentication Service
US11818287B2 (en) Method and system for monitoring and validating electronic transactions
US20240037549A1 (en) Method for authenticating internet users
JP2917561B2 (en) Unauthorized use detection method in telephone service using card
KR102373152B1 (en) O2o rental mediation service method and platform
KR20040021425A (en) credit transactions recognition system using LBS and method for recognizing the same

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): CA CN JP KR SG

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE

121 Ep: the epo has been informed by wipo that ep was designated in this application
CFP Corrected version of a pamphlet front page
CR1 Correction of entry in section i

Free format text: PAT.BUL.55/96 UNDER INID(81)"DESIGNATED STATES",ADD "FI"

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: CA